Hasan Mujtaba Buttar - Academia.edu (original) (raw)
Uploads
Papers by Hasan Mujtaba Buttar
arXiv (Cornell University), Jan 8, 2023
Non-intrusive load monitoring (NILM) or energy disaggregation is an inverse problem whereby the g... more Non-intrusive load monitoring (NILM) or energy disaggregation is an inverse problem whereby the goal is to extract the load profiles of individual appliances, given an aggregate load profile of the mains of a home. NILM could help identify the power usage patterns of individual appliances in a home, and thus, could help realize novel energy conservation schemes for smart homes. In this backdrop, this work proposes a novel deep-learning approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural network (CNN) model to come up with the proposed seq2-[3]-point CNN model to solve the (home) NILM problem and site-NILM problem (basically, NILM at a smaller scale). 2) We solve the related problem of appliance identification by building upon the state-of-the-art (pretrained) 2D-CNN models, i.e., AlexNet, ResNet-18, and DenseNet-121, which are trained upon two custom datasets that consist of Wavelets and short-time Fourier transform (STFT)-based 2D electrical signatures of the appliances. 3) Finally, we do some basic qualitative inference about an individual appliance's health by comparing the power consumption of the same appliance across multiple homes. Low-frequency REDD dataset is used to train and test the proposed deep learning models for all problems, except site-NILM where REFIT dataset has been used. As for the results, we achieve a maximum accuracy of 94.6% for home-NILM, 81% for site-NILM, and 88.9% for appliance identification (with Resnet-based model).
arXiv (Cornell University), Jun 16, 2023
In this work, we report for the first time a novel non-contact method for dehydration monitoring ... more In this work, we report for the first time a novel non-contact method for dehydration monitoring from a distance. Specifically, the proposed setup consists of a transmit software defined radio (SDR) that impinges a wideband radio frequency (RF) signal (of frequency 5.23 GHz) in the microwave band onto either the chest or the hand of a subject who sits nearby. Further, another SDR in the closed vicinity collects the RF signals reflected off the chest (or passed through the hand) of the subject. Note that the two SDRs exchange orthogonal frequency division multiplexing (OFDM) signal, whose individual subcarriers get modulated once it reflects off (passes through) the chest (the hand) of the subject. This way, the signal collected by the receive SDR consists of channel frequency response (CFR) that captures the variation in the blood osmolality due to dehydration. The received raw CFR data is then passed through a handful of machine learning (ML) classifiers which once trained, output the classification result (i.e., whether a subject is hydrated or dehydrated). For the purpose of training our ML classifiers, we have constructed our custom HCDDM-RF-5 dataset by collecting data from 5 Muslim subjects (before and after sunset) who were fasting during the month of Ramadan. Specifically, we have implemented and tested the following ML classifiers (and their variants): K-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), ensemble classifier, and neural network classifier. Among all the classifiers, the neural network classifier acheived the best classification accuracy, i.e., an accuracy of 93.8% for the proposed chest-based method, and an accuracy of 96.15% for the proposed hand-based method. Compared to the state-of-the-art (i.e., the contact-based dehydration monitoring method) where the reported accuracy is 97.83%, our proposed non-contact method is slightly inferior (as we report a maximum accuracy of 96.15%); nevertheless, the advantages of our non-contact dehydration method speak for themselves. That is, our proposed method is non-invasive and contact-less, has high accuracy, allows continuous and seamless monitoring, is easy to use, and provides rapid results. The anticipated beneficiaries of the proposed method include: sportsmen, athletes, elderly, diabetic and diarrhea patients, and labor working outdoors.
IEEE Sensors Journal
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node an... more This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple active malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closedform expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.
arXiv (Cornell University), Apr 2, 2022
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node an... more This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple active malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closedform expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.
arXiv (Cornell University), Jan 8, 2023
Non-intrusive load monitoring (NILM) or energy disaggregation is an inverse problem whereby the g... more Non-intrusive load monitoring (NILM) or energy disaggregation is an inverse problem whereby the goal is to extract the load profiles of individual appliances, given an aggregate load profile of the mains of a home. NILM could help identify the power usage patterns of individual appliances in a home, and thus, could help realize novel energy conservation schemes for smart homes. In this backdrop, this work proposes a novel deep-learning approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural network (CNN) model to come up with the proposed seq2-[3]-point CNN model to solve the (home) NILM problem and site-NILM problem (basically, NILM at a smaller scale). 2) We solve the related problem of appliance identification by building upon the state-of-the-art (pretrained) 2D-CNN models, i.e., AlexNet, ResNet-18, and DenseNet-121, which are trained upon two custom datasets that consist of Wavelets and short-time Fourier transform (STFT)-based 2D electrical signatures of the appliances. 3) Finally, we do some basic qualitative inference about an individual appliance's health by comparing the power consumption of the same appliance across multiple homes. Low-frequency REDD dataset is used to train and test the proposed deep learning models for all problems, except site-NILM where REFIT dataset has been used. As for the results, we achieve a maximum accuracy of 94.6% for home-NILM, 81% for site-NILM, and 88.9% for appliance identification (with Resnet-based model).
arXiv (Cornell University), Jun 16, 2023
In this work, we report for the first time a novel non-contact method for dehydration monitoring ... more In this work, we report for the first time a novel non-contact method for dehydration monitoring from a distance. Specifically, the proposed setup consists of a transmit software defined radio (SDR) that impinges a wideband radio frequency (RF) signal (of frequency 5.23 GHz) in the microwave band onto either the chest or the hand of a subject who sits nearby. Further, another SDR in the closed vicinity collects the RF signals reflected off the chest (or passed through the hand) of the subject. Note that the two SDRs exchange orthogonal frequency division multiplexing (OFDM) signal, whose individual subcarriers get modulated once it reflects off (passes through) the chest (the hand) of the subject. This way, the signal collected by the receive SDR consists of channel frequency response (CFR) that captures the variation in the blood osmolality due to dehydration. The received raw CFR data is then passed through a handful of machine learning (ML) classifiers which once trained, output the classification result (i.e., whether a subject is hydrated or dehydrated). For the purpose of training our ML classifiers, we have constructed our custom HCDDM-RF-5 dataset by collecting data from 5 Muslim subjects (before and after sunset) who were fasting during the month of Ramadan. Specifically, we have implemented and tested the following ML classifiers (and their variants): K-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), ensemble classifier, and neural network classifier. Among all the classifiers, the neural network classifier acheived the best classification accuracy, i.e., an accuracy of 93.8% for the proposed chest-based method, and an accuracy of 96.15% for the proposed hand-based method. Compared to the state-of-the-art (i.e., the contact-based dehydration monitoring method) where the reported accuracy is 97.83%, our proposed non-contact method is slightly inferior (as we report a maximum accuracy of 96.15%); nevertheless, the advantages of our non-contact dehydration method speak for themselves. That is, our proposed method is non-invasive and contact-less, has high accuracy, allows continuous and seamless monitoring, is easy to use, and provides rapid results. The anticipated beneficiaries of the proposed method include: sportsmen, athletes, elderly, diabetic and diarrhea patients, and labor working outdoors.
IEEE Sensors Journal
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node an... more This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple active malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closedform expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.
arXiv (Cornell University), Apr 2, 2022
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node an... more This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple active malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closedform expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.